Researchers uncovered two security vulnerabilities in Microsoft Windows that could put businesses at risk of credential forwarding and password cracking.
It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.
Security researchers linked three cyber espionage campaigns to a group that exploits leaked Hacking Team tools and flaws in outdated software.
Researchers discovered a haunting technique they're calling a GhostHook attack, which uses a feature in Intel CPUs to take over 64-bit Windows.
Depending on who you ask, the Fireball malware infected somewhere between 40 and 250 million Windows devices. The potential danger, however, is undisputed.
To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.
An old Windows bug has resurfaced, causing newer systems to crash or display the blue screen of death. Here's what you need to know.
Security intelligence solutions such as QRadar UBA enable analysts to detect potentially malicious activity on Microsoft Office 365 cloud-based apps.
IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
While Microsoft could have slowed the spread of WannaCry, the real problem lies in the widespread practice of deploying outdated software and systems.